Let's Defend Malware Analysis [Easy]
10 Total Writeups
Http Basic Authv
We received a log indicating a possible attack, can you gather information from the pcap file?
IcedID malware family
Sample source: malware-traffic analysis
Obfuscated HTA
A suspicious HTA file was found on an infected machine
Obfuscated JavaScript
Imagine you are a cybersecurity analyst at a mid-sized tech company. One morning you receive multiple report from employees that their web applications are behaving erratically.
PowerShell Keylogger
Analyze the PowerShell Keylogger as a malware analyst
PowerShell Script
You have a suspicious Powershell command and need to understand the purpose of this command
Presentation as a Malware
Can a ppt file be malicious?
Upstyle Backdoor
Help us to analyze specifically targeting a backdoor known as UPSTYLE
Android Info Stealer
A user downloads what appears to be a legitimate mobile app from an app store
Batch Downloader
A malicious batch file has been discovered that downloads and executes files associated with it